Dan, Just to agree with what Paul said, we don't run with auditd in our ubuntu zones. We do have rsyslogd running but I haven't tried to do much with configuring it.
Jerry On Sun, Feb 1, 2015 at 2:51 PM, Dan McDonald via smartos-discuss < [email protected]> wrote: > Good news: I got it to zsched, via a Frankenstein-like > lx_boot_zone_redhat (attached). > > Bad news: I'm hanging on two processes: rsyslogd and auditd: > > [root@00-0c-29-77-9d-fe ~]# ptree 19446 > 19376 zsched > 19446 /sbin/init > 19569 /bin/bash /etc/rc.d/rc 3 > 19744 /bin/bash /etc/rc3.d/S11auditd start > 19748 /bin/bash -c ulimit -S -c 0 >/dev/null 2>&1 ; auditd > 19750 auditd > 19570 /bin/bash /etc/rc.d/rc 3 > 19763 /bin/bash /etc/rc3.d/S12rsyslog start > 19765 /bin/bash -c ulimit -S -c 0 >/dev/null 2>&1 ; /sbin/rsyslogd > -i / > 19766 /sbin/rsyslogd -i /var/run/syslogd.pid -c 5 > 19767 <defunct> > [root@00-0c-29-77-9d-fe ~]# > > > It's generating corefiles alright! > > [root@00-0c-29-77-9d-fe /zones/2394dc9a-5493-4317-9304-ce91cc6a3b83]# ls > cores/ > core.audispd.20389 core.init.20418 core.init.20423 core.init.20428 > core.audispd.20396 core.init.20419 core.init.20424 core.init.20429 > core.auditd.20387 core.init.20420 core.init.20425 core.init.20430 > core.auditd.20394 core.init.20421 core.init.20426 > core.init.20417 core.init.20422 core.init.20427 > [root@00-0c-29-77-9d-fe /zones/2394dc9a-5493-4317-9304-ce91cc6a3b83]# > > The second time I created a VM, it only stopped at auditd. auditd seems > to be a problem. Of course, the script (attached) still doesn't seem to > want to change the selinux configuration from this: > > # This file controls the state of SELinux on the system. > # SELINUX= can take one of these three values: > # enforcing - SELinux security policy is enforced. > # permissive - SELinux prints warnings instead of enforcing. > # disabled - No SELinux policy is loaded. > SELINUX=permissive > # SELINUXTYPE= can take one of these two values: > # targeted - Targeted processes are protected, > # mls - Multi Level Security protection. > SELINUXTYPE=targeted > > > to this: > > > # This file controls the state of SELinux on the system. > # SELINUX= can take one of these three values: > # enforcing - SELinux security policy is enforced. > # permissive - SELinux prints warnings instead of enforcing. > # disabled - No SELinux policy is loaded. > SELINUX=disabled > # SELINUXTYPE= can take one of these two values: > # targeted - Targeted processes are protected, > # mls - Multi Level Security protection. > SELINUXTYPE=targeted > > > Thanks! > Dan > > > > ------------------------------------------- > smartos-discuss > Archives: https://www.listbox.com/member/archive/184463/=now > RSS Feed: > https://www.listbox.com/member/archive/rss/184463/21516906-2011406d > Modify Your Subscription: > https://www.listbox.com/member/?& > Powered by Listbox: http://www.listbox.com > ------------------------------------------- smartos-discuss Archives: https://www.listbox.com/member/archive/184463/=now RSS Feed: https://www.listbox.com/member/archive/rss/184463/25769125-55cfbc00 Modify Your Subscription: https://www.listbox.com/member/?member_id=25769125&id_secret=25769125-7688e9fb Powered by Listbox: http://www.listbox.com
